Comparative analysis of intrusion detection systems on library information systems


Download 133.77 Kb.
bet3/3
Sana18.06.2023
Hajmi133.77 Kb.
#1558077
1   2   3
Bog'liq
maqola new (2)

Conclusion
Good security practices dictate that Library Information Systems should be deployed strong security requirements. IDS monitor hosts for system alteration or sniffs network packets off the wire, seeking for malicious contents. IDS can be configured purely as monitoring and detection devices or it can participate as an inline device and prevent threats. Its biggest weaknesses are the high number of false-positives and the maintenance effort needed to keep signatures up to date and fine-tuned. There are also a number of unsolved issues concerning the analysis of attack to LIS. Detection analysis is clearly in the commercial domain now, but has been shown to be insufficient for detecting all attacks. Therefore, work is still in progress to experiment with new approaches to both knowledge-based and behavior based intrusion detection. Today IDSs are also working with artificial intelligence. That’s why, we are expected to see an upswing in this field.


References:



  1. Cherdantseva Y. and Hilton J. "A Reference Model of Information Assurance & Security," SecOnt 2013 workshop in conjunction with the 8th International Conference on Availability, Reliability and Security (ARES) 2013, University of Regensburg, Germany.September 2–6, 2013. IEEE Proceedings.

  2. Hadow, K. (2009). Data security for libraries: Prevent problems, don’t detect them. Feliciter, 55(2).

  3. Vikas Singh and Madhusudhan Margam.” Information Security Measures of Libraries of Central Universities of Delhi : A Study”. University of Delhi,. India. 2, March 2018, pp. 102-109

  4. J. Shivarama. Mrs. Vaishali A. Dawar.” DIGITAL INFORMATION SECURITY FOR ACADEMIC LIBRARIES: AN OVERVIEW”. April 2016. Deonar, Mumbai.

  5. Williams, R.L. Computer and network security in small libraries: A guide for planning. Texas State Library Archieve Com, 2001. http://www.tsl.state.tx.us/ld/pubs/ compsecurity/ (Accessed on 21 September, 2016).

  6. Kuzma, J. (2010), “European digital libraries: web security vulnerabilities”, Library Hi Tech, Vol. 28 No. 3, pp. 402-413.

  7. Intrusion Detection Systems Part 1 “B U Y E R ’ S G U I D E”.

http://www.icsa.net/html/communities/ids/buyers_guide/index.shtml. On website ICSA.net.
Download 133.77 Kb.

Do'stlaringiz bilan baham:
1   2   3




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling